Surveillance by Intelligence Services – Fundamental Rights Safeguards And

Total Page:16

File Type:pdf, Size:1020Kb

Surveillance by Intelligence Services – Fundamental Rights Safeguards And FREEDOMS FRA Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU and remedies safeguards rights fundamental services: intelligence by Surveillance Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU Mapping Member States’ legal frameworks This report addresses matters related to the respect for private and family life (Article 7), the protection of personal data (Article 8) and the right to an effective remedy and a fair trial (Article 47) falling under Titles II ‘Freedoms’ and VI ‘Justice’ of the Charter of Fundamental Rights of the European Union. Europe Direct is a service to help you find answers to your questions about the European Union. Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). Photo (cover & inside): © Shutterstock More information on the European Union is available on the Internet (http://europa.eu). FRA – European Union Agency for Fundamental Rights Schwarzenbergplatz 11 – 1040 Vienna – Austria Tel. +43 158030-0 – Fax +43 158030-699 fra.europa.eu – [email protected] Luxembourg: Publications Office of the European Union, 2015 Paper: 978-92-9491-225-1 10.2811/85028 TK-04-16-020-EN-C PDF: 978-92-9491-224-4 10.2811/009038 TK-04-16-020-EN-N © European Union Agency for Fundamental Rights, 2015 Reproduction is authorised, provided the source is acknowledged. Printed in Belgium Printed on process chlorine-free recycled paper (PCF) Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU Mapping Member States’ legal frameworks Foreword Protecting the public from genuine threats to security and safeguarding fundamental rights involves a delicate bal- ance, and has become a particularly complex challenge in recent years. Terror attacks worldwide have triggered broad measures allowing intelligence services to cast ever-wider nets in the hope of preventing further violence. At the same time, the digital age has produced technological innovations facilitating large-scale communications data monitoring – which could easily be abused. These developments affect a variety of fundamental rights protected by European Union (EU) law, particularly the rights to privacy and data protection – enshrined in Articles 7 and 8 of the Charter of Fundamental Rights of the Euro- pean Union, the EU treaties and EU directives. The Snowden revelations, which uncovered extensive and indiscriminate surveillance efforts worldwide, highlight that violations of these rights are not merely a theoretical concern. The sheer magnitude of the uncovered intelli- gence activity has prompted disquiet and underscored the importance of maintaining effective mechanisms to help prevent fundamental rights encroachments. The European Parliament responded with a resolution which, among others, calls on the European Union Agency for Fundamental Rights to research thoroughly fundamental rights pro- tection in the context of surveillance, in particular in terms of available remedies. This report – which constitutes the first part of FRA’s response to this request – aims to support the adoption and meaningful implementation of oversight mechanisms in the EU and its Member States. It does so by analysing the legal frameworks on surveillance in place in EU Member States, focusing on so-called ‘mass surveillance’, which car- ries a particularly high potential for abuse. The report does not assess the implementation of the respective laws; instead, it maps the relevant legal frameworks in the Member States. It also details oversight mechanisms introduced across the EU, outlines the work of entities tasked with overseeing surveillance measures, and presents the various remedies available to individuals seeking to challenge such intelligence activities. The research findings presented in this report demonstrate the complex considerations involved in safeguarding fundamental rights in the context of surveillance. Finding a balance between national security protection and respect for fundamental rights is a challenge that requires thorough and candid discussion. This report contributes to that discussion. Constantinos Manolopoulos Director a. i. 3 Country codes Code EU Member State AT Austria BE Belgium BG Bulgaria CY Cyprus CZ Czech Republic DE Germany DK Denmark EE Estonia EL Greece ES Spain FI Finland FR France HR Croatia HU Hungary IE Ireland IT Italy LT Lithuania LU Luxembourg LV Latvia MT Malta NL Netherlands PL Poland PT Portugal RO Romania SE Sweden SK Slovakia SI Slovenia UK United Kingdom 4 Contents FOREWORD ������������������������������������������������������������������������������������������������������������������������������������������������������������������������������ 3 INTRODUCTION ����������������������������������������������������������������������������������������������������������������������������������������������������������������������� 7 1 INTELLIGENCE SERVICES AND SURVEILLANCE LAWS ��������������������������������������������������������������������������������������������������� 13 1.1. Intelligence services ................................................................................................................................................. 13 1.2. Surveillance measures .............................................................................................................................................. 15 1.3. Member States’ laws on surveillance ................................................................................................................... 18 FRA key findings ................................................................................................................................................................. 27 2 OVERSIGHT OF INTELLIGENCE SERVICES ����������������������������������������������������������������������������������������������������������������������� 29 2.1. Executive control ...................................................................................................................................................... 32 2.2. Parliamentary oversight ......................................................................................................................................... 34 2.3. Expert oversight ........................................................................................................................................................ 41 2.4. Approval and review of surveillance measures ��������������������������������������������������������������������������������������������������� 51 FRA key findings ................................................................................................................................................................. 57 3 REMEDIES ������������������������������������������������������������������������������������������������������������������������������������������������������������������������ 59 3.1. A precondition: obligation to inform and the right to access ............................................................................. 61 3.2. Judicial remedies ...................................................................................................................................................... 66 3.3. Non-judicial remedies: independence, mandate and powers .......................................................................... 70 FRA key findings ................................................................................................................................................................. 75 CONCLUSIONS ���������������������������������������������������������������������������������������������������������������������������������������������������������������������� 77 REFERENCES ������������������������������������������������������������������������������������������������������������������������������������������������������������������������� 79 CASE LAW INDEX ����������������������������������������������������������������������������������������������������������������������������������������������������������������� 86 LEGAL INSTRUMENTS INDEX ���������������������������������������������������������������������������������������������������������������������������������������������� 87 ANNEX: OVERVIEW OF SECURITY AND INTELLIGENCE SERVICES IN THE EU‑28 ������������������������������������������������������������� 93 List of figures and tables Figure 1: A conceptual model of signals intelligence ..................................................................................................... 16 Figure 2: Intelligence services’ accountability mechanisms ......................................................................................... 31 Figure 3: Forms of control exercised over the intelligence services by the executive across the EU-28 .............. 33 Figure 4: Specialised expert bodies and DPAs across the EU-28 ................................................................................. 50 Figure 5: Remedial avenues at the national level .......................................................................................................... 60 Figure 6: Types of national oversight bodies with powers to hear individual complaints in the context of surveillance, by EU Member State ................................................................................................ 73 Table 1: Categories of powers
Recommended publications
  • From the Editor
    EDITORIAL STAFF From the Editor ELIZABETH SKINNER Editor Happy New Year, everyone. As I write this, we’re a few weeks into 2021 and there ELIZABETH ROBINSON Copy Editor are sparkles of hope here and there that this year may be an improvement over SALLY BAHO Copy Editor the seemingly endless disasters of the last one. Vaccines are finally being deployed against the coronavirus, although how fast and for whom remain big sticky questions. The United States seems to have survived a political crisis that brought EDITORIAL REVIEW BOARD its system of democratic government to the edge of chaos. The endless conflicts VICTOR ASAL in Syria, Libya, Yemen, Iraq, and Afghanistan aren’t over by any means, but they have evolved—devolved?—once again into chronic civil agony instead of multi- University of Albany, SUNY national warfare. CHRISTOPHER C. HARMON 2021 is also the tenth anniversary of the Arab Spring, a moment when the world Marine Corps University held its breath while citizens of countries across North Africa and the Arab Middle East rose up against corrupt authoritarian governments in a bid to end TROELS HENNINGSEN chronic poverty, oppression, and inequality. However, despite the initial burst of Royal Danish Defence College change and hope that swept so many countries, we still see entrenched strong-arm rule, calcified political structures, and stagnant stratified economies. PETER MCCABE And where have all the terrorists gone? Not far, that’s for sure, even if the pan- Joint Special Operations University demic has kept many of them off the streets lately. Closed borders and city-wide curfews may have helped limit the operational scope of ISIS, Lashkar-e-Taiba, IAN RICE al-Qaeda, and the like for the time being, but we know the teeming refugee camps US Army (Ret.) of Syria are busy producing the next generation of violent ideological extremists.
    [Show full text]
  • Report Legal Research Assistance That Can Make a Builds
    EUROPEAN DIGITAL RIGHTS A LEGAL ANALYSIS OF BIOMETRIC MASS SURVEILLANCE PRACTICES IN GERMANY, THE NETHERLANDS, AND POLAND By Luca Montag, Rory Mcleod, Lara De Mets, Meghan Gauld, Fraser Rodger, and Mateusz Pełka EDRi - EUROPEAN DIGITAL RIGHTS 2 INDEX About the Edinburgh 1.4.5 ‘Biometric-Ready’ International Justice Cameras 38 Initiative (EIJI) 5 1.4.5.1 The right to dignity 38 Introductory Note 6 1.4.5.2 Structural List of Abbreviations 9 Discrimination 39 1.4.5.3 Proportionality 40 Key Terms 10 2. Fingerprints on Personal Foreword from European Identity Cards 42 Digital Rights (EDRi) 12 2.1 Analysis 43 Introduction to Germany 2.1.1 Human rights country study from EDRi 15 concerns 43 Germany 17 2.1.2 Consent 44 1 Facial Recognition 19 2.1.3 Access Extension 44 1.1 Local Government 19 3. Online Age and Identity 1.1.1 Case Study – ‘Verification’ 46 Cologne 20 3.1 Analysis 47 1.2 Federal Government 22 4. COVID-19 Responses 49 1.3 Biometric Technology 4.1 Analysis 50 Providers in Germany 23 4.2 The Convenience 1.3.1 Hardware 23 of Control 51 1.3.2 Software 25 5. Conclusion 53 1.4 Legal Analysis 31 Introduction to the Netherlands 1.4.1 German Law 31 country study from EDRi 55 1.4.1.1 Scope 31 The Netherlands 57 1.4.1.2 Necessity 33 1. Deployments by Public 1.4.2 EU Law 34 Entities 60 1.4.3 European 1.1. Dutch police and law Convention on enforcement authorities 61 Human Rights 37 1.1.1 CATCH Facial 1.4.4 International Recognition Human Rights Law 37 Surveillance Technology 61 1.1.1.1 CATCH - Legal Analysis 64 EDRi - EUROPEAN DIGITAL RIGHTS 3 1.1.2.
    [Show full text]
  • The Right to Privacy and the Future of Mass Surveillance’
    ‘The Right to Privacy and the Future of Mass Surveillance’ ABSTRACT This article considers the feasibility of the adoption by the Council of Europe Member States of a multilateral binding treaty, called the Intelligence Codex (the Codex), aimed at regulating the working methods of state intelligence agencies. The Codex is the result of deep concerns about mass surveillance practices conducted by the United States’ National Security Agency (NSA) and the United Kingdom Government Communications Headquarters (GCHQ). The article explores the reasons for such a treaty. To that end, it identifies the discriminatory nature of the United States’ and the United Kingdom’s domestic legislation, pursuant to which foreign cyber surveillance programmes are operated, which reinforces the need to broaden the scope of extraterritorial application of the human rights treaties. Furthermore, it demonstrates that the US and UK foreign mass surveillance se practices interferes with the right to privacy of communications and cannot be justified under Article 17 ICCPR and Article 8 ECHR. As mass surveillance seems set to continue unabated, the article supports the calls from the Council of Europe to ban cyber espionage and mass untargeted cyber surveillance. The response to the proposal of a legally binding Intelligence Codexhard law solution to mass surveillance problem from the 47 Council of Europe governments has been so far muted, however a soft law option may be a viable way forward. Key Words: privacy, cyber surveillance, non-discrimination, Intelligence Codex, soft law. Introduction Peacetime espionage is by no means a new phenomenon in international relations.1 It has always been a prevalent method of gathering intelligence from afar, including through electronic means.2 However, foreign cyber surveillance on the scale revealed by Edward Snowden performed by the United States National Security Agency (NSA), the United Kingdom Government Communications Headquarters (GCHQ) and their Five Eyes partners3 1 Geoffrey B.
    [Show full text]
  • Mass Surveillance
    Thematic factsheet1 Update: July 2018 MASS SURVEILLANCE The highly complex forms of terrorism require States to take effective measures to defend themselves, including mass monitoring of communications. Unlike “targeted” surveillance (covert collection of conversations, telecommunications and metadata by technical means – “bugging”), “strategic” surveillance (or mass surveillance) does not necessarily start with a suspicion against a particular person or persons. It has a proactive element, aimed at identifying a danger rather than investigating a known threat. Herein lay both the value it can have for security operations, and the risks it can pose for individual rights. Nevertheless, Member States do not have unlimited powers in this area. Mass surveillance of citizens is tolerable under the Convention only if it is strictly necessary for safeguarding democratic institutions. Taking into account considerable potential to infringe fundamental rights to privacy and to freedom of expression enshrined by the Convention, Member States must ensure that the development of surveillance methods resulting in mass data collection is accompanied by the simultaneous development of legal safeguards securing respect for citizens’ human rights. According to the case-law of the European Court of Human Rights, it would be counter to governments’ efforts to keep terrorism at bay if the terrorist threat were substituted with a perceived threat of unfettered executive power intruding into citizens’ private lives. It is of the utmost importance that the domestic legislation authorizing far-reaching surveillance techniques and prerogatives provides for adequate and sufficient safeguards in order to minimize the risks for the freedom of expression and the right to privacy which the “indiscriminate capturing of vast amounts of communications” enables.
    [Show full text]
  • Geheimdienste
    1 | 2016 Preis: GLOBAL 3,– Euro VIEWUnabhängiges Magazin der Österreichischen Gesellschaft für Außenpolitik und die Vereinten Nationen (ÖGAVN) und des Akademischen Forums für Außenpolitik (AFA) Geheimdienste http://www.globalview.at ISSN: 1992-9889 DVR: 0875538 Nr.1/2016; global view cover 1/2016.indd 1 11.04.16 09:57 Mit einem Beitrag von Rudolf Hundstorfer Bitte gehen Sie wählen! Die Bundespräsidenten Wahl naht und wir möchten an Sie appellieren, von Ihrem Wahl- recht Gebrauch zu machen. Gehen Sie zur Wahl und bestimmen Sie mit, wer die nächsten 6 Jah- re unser Staatsoberhaupt sein soll. Weder das AFA noch die ÖGAVN können aufgrund Ihrer Überparteilichkeit eine Wahlempfehlung abge- ben, aber Sie zumindest bitten, Ihrer demokra- tischen Pflicht nachzukommen und wählen zu gehen. Wir möchten Ihnen hier auch einige Bücher von den Kandidatinnen und Kandidaten bzw. ein Buch, in dem zwei Kandidaten einen Beitrag verfasst haben, präsentieren. Zudem natürlich auch die Bücher unseres amtierenden Staats- oberhaupts und seiner „First Lady“. Liebe Leserin! Lieber Leser! Dear Readers! Jeder kennt ihn, viele begehren ihn, viele fürch- gehrten James-Bond-Filmen, entsprechen ver- ten ihn: Die Rede ist von Mr. Bond, James Bond. mutlich (noch) nicht der Realität, aber dennoch Der wohl bekannteste Geheimagent der Welt ist werfen wir einen Blick auf das Land, in dem ei- zwar nur Fiktion in Ian Flemmings Geschichten, ner der Nobelkarosen unseres Vorzeigeagenten, aber der Stereotyp eines „Geheimdienstlers“ ein BMW, produziert wird, und beleuchten den ist geschaffen. Gut aussehend, charmant, stark Waffenhandel der Bundesrepublik Deutschland. und den Bösewichten immer um einen Schritt Den so wertvollen Treibstoff für diese Autos pro- voraus.
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]
  • Russian Meddling in Western Elections, 2016-2017: a Preliminary
    RUSSIAN MEDDLING IN WESTERN ELECTIONS, 2016-2017: A PRELIMINARY PROBE By Guillermo Lopez Sanchez A thesis submitted to the Graduate Council of Texas State University in partial fulfillment of the requirements for the degree of Master of Arts with a Major in International Studies May 2018 Committee Members: Dennis J. Dunn, Chair Ronald Angelo Johnson Sandhya Rao COPYRIGHT by Guillermo Lopez Sanchez 2018 FAIR USE AND AUTHOR’S PERMISSION STATEMENT Fair Use This work is protected by the Copyright Laws of the United States (Public Law 94-553, section 107). Consistent with fair use as defined in the Copyright Laws, brief quotations from this material are allowed with proper acknowledgement. Use of this material for financial gain without the author’s express written permission is not allowed. Duplication Permission As the copyright holder of this work I, Guillermo Lopez Sanchez, authorize duplication of this work, in whole or in part, for educational or scholarly purposes only. ACKNOWLEDGEMENTS I express my gratitude to Dr. Dennis J. Dunn, Professor of History and Director of the Center for International Studies at Texas State University. His dedication, knowledge, and support since I began the Master of Arts with a major in International Studies were invaluable. In addition, my appreciation is extended to Dr. Ronald Angelo Johnson, Associate Professor in the Department of History; and Dr. Sandhya Rao, Professor in the Department of Mass Communication, for their outstanding advice and assistance. Collectively, they strengthened my resources, asked probing questions that helped me sharpen my focus, and provided valuable insights that benefitted my research. I also wish to express my appreciation to Jeremy Pena, Coordinator of Academic Programs at the Center for International Studies, for his administrative support.
    [Show full text]
  • We Only Spy on Foreigners": the Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance
    Chicago Journal of International Law Volume 18 Number 2 Article 3 1-1-2018 "We Only Spy on Foreigners": The Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance Asaf Lubin Follow this and additional works at: https://chicagounbound.uchicago.edu/cjil Recommended Citation Lubin, Asaf (2018) ""We Only Spy on Foreigners": The Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance," Chicago Journal of International Law: Vol. 18: No. 2, Article 3. Available at: https://chicagounbound.uchicago.edu/cjil/vol18/iss2/3 This Article is brought to you for free and open access by Chicago Unbound. It has been accepted for inclusion in Chicago Journal of International Law by an authorized editor of Chicago Unbound. For more information, please contact [email protected]. “We Only Spy on Foreigners”: The Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance Asaf Lubin Abstract The digital age brought with it a new epoch in global political life, one neatly coined by Professor Philip Howard as the “pax technica.” In this new world order, government and industry are “tightly bound” in technological and security arrangements that serve to push forward an information and cyber revolution of unparalleled magnitude. While the rise of information technologies tells a miraculous story of triumph over the physical constraints that once shackled mankind, these very technologies are also the cause of grave concern. Intelligence agencies have been recently involved in the exercise of global indiscriminate surveillance, which purports to go beyond their limited territorial jurisdiction and sweep in “the telephone, internet, and location records of whole populations.” Today’s political leaders and corporate elites are increasingly engaged in these kinds of programs of bulk interception, collection, mining, analysis, dissemination, and exploitation of foreign communications data that are easily susceptible to gross abuse and impropriety.
    [Show full text]
  • The Effectiveness of Surveillance Technology: What Intelligence Officials Are Saying
    Delft University of Technology The effectiveness of surveillance technology What intelligence officials are saying Cayford, Michelle; Pieters, Wolter DOI 10.1080/01972243.2017.1414721 Publication date 2018 Document Version Final published version Published in Information Society Citation (APA) Cayford, M., & Pieters, W. (2018). The effectiveness of surveillance technology: What intelligence officials are saying. Information Society, 34(2), 88-103. https://doi.org/10.1080/01972243.2017.1414721 Important note To cite this publication, please use the final published version (if applicable). Please check the document version above. Copyright Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons. Takedown policy Please contact us and provide details if you believe this document breaches copyrights. We will remove access to the work immediately and investigate your claim. This work is downloaded from Delft University of Technology. For technical reasons the number of authors shown on this cover page is limited to a maximum of 10. THE INFORMATION SOCIETY 2018, VOL. 34, NO. 2, 88–103 https://doi.org/10.1080/01972243.2017.1414721 The effectiveness of surveillance technology: What intelligence officials are saying Michelle Cayford and Wolter Pieters Faculty of Technology, Policy and Management, Delft University of Technology, Delft, The Netherlands ABSTRACT ARTICLE HISTORY In recent years, Western governments have come under sharp criticism for their use of surveillance Received 5 October 2016 technology. They have been accused of sweeping up massive amounts of information without Accepted 27 November 2017 evidence of the technologies being effective in improving security.
    [Show full text]
  • “Why Protest? I've Got Nothing to Hide” Collective Action Against And
    “Why protest? I’ve got nothing to hide” Collective Action against and Chilling Effects of Internet Mass Surveillance A Master’s Dissertation presented to the Faculty of Politics and International Relations, University of Kent and the Faculty of Social Science and Philosophy, Philipps-Universität Marburg in fulfilment of the requirements for the Degree Master of Arts in Peace and Conflict Studies (International Double Award) by Dipl.-Psych. Johannes Nau Marburg August 2014 ! “Why protest? I’ve got nothing to hide” - Collective Action against and Chilling Effects of Internet Mass Surveillance A Master’s Dissertation presented to the Faculty of Politics and International Relations, University of Kent and the Faculty of Social Science and Philosophy, Philipps-Universität Marburg in fulfilment of the requirements for the Degree Master of Arts in Peace and Conflict Studies (International Double Award) Word Count: 14790 Copyright © 2014 Johannes Nau This work is licensed under a Creative Commons Attribution – Non-commercial 4.0 International License (CC BY-NC 4.0) The content of this master’s dissertation may be used, shared and copied on the condition that appropriate credit is given to the author, indication of changes are made and the material is used for non-commercial purposes only. The full-length legal code / license can be accessed under: https://creativecommons.org/licenses/by-nc/4.0/legalcode ! Acknowledgments In preparation for this thesis, I have received support from various people whom I would like to thank. First of all I want to give credit to my supervisors from Marburg and Canterbury Prof Dr Wagner and Dr Morgan-Jones for the friendly, competent and reliable supervision and support.
    [Show full text]
  • Civil-Military Capacities for European Security
    Clingendael Report Civil-Military Capacities for European Security Margriet Drent Kees Homan Dick Zandee Civil-Military Capacities for European Security Civil-Military Capacities for European Security Margriet Drent Kees Homan Dick Zandee © Netherlands Institute of International Relations Clingendael. All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the copyright holders. Image rights: Drone, Binary Code: © Shutterstock.com Search and Rescue squadron: © David Fowler / Shutterstock.com Design: Textcetera, The Hague Print: Gildeprint, Enschede Clingendael Institute P.O. Box 93080 2509 AB The Hague The Netherlands Email: [email protected] Website: http://www.clingendael.nl/ Content Executive summary 7 Introduction 11 1 The external-internal security gap 13 2 Case study maritime security 25 3 Case study border security 39 4 Case study cyber security 53 5 Conclusions and recommendations 64 List of acronyms 70 5 Executive summary In the last two decades the European Union has created separated policies, institutions and capacities for external and internal security. In the meantime the world’s security environment has changed fundamentally. Today, it is no longer possible to make a clear distinction between security outside and within Europe. Conflicts elsewhere in the world often have direct spill-over effects, not primarily in terms of military threats but by challenges posed by illegal immigration, terrorism, international crime and illegal trade. Lampedusa has become a synonym for tragedy. Crises and instability in Africa, the Middle East and elsewhere in the world provide breeding grounds for extremism, weapons smuggling, drugs trafficking or kidnapping.
    [Show full text]
  • National Programmes for Mass Surveillance of Personal Data in Eu Member States and Their Compatibility with Eu Law
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS NATIONAL PROGRAMMES FOR MASS SURVEILLANCE OF PERSONAL DATA IN EU MEMBER STATES AND THEIR COMPATIBILITY WITH EU LAW STUDY Abstract In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this study makes an assessment of the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of surveillance practices at stake, which represent a reconfiguration of traditional intelligence gathering, the study contends that an analysis of European surveillance programmes cannot be reduced to a question of balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The study argues that these surveillance programmes do not stand outside the realm of EU intervention but can be engaged from an EU law perspective via (i) an understanding of national security in a democratic rule of law framework where fundamental human rights standards and judicial oversight constitute key standards; (ii) the risks presented to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners, and (iii) the potential spillover into the activities and responsibilities of EU agencies.
    [Show full text]